Difference between revisions of "Twister"

From The ECRYPT Hash Function Website
m
(updated results)
Line 23: Line 23:
 
|    Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference  
 
|    Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference  
 
|-                                         
 
|-                                         
|  | pseudo-collision || compression || all ||  || 2<sup>26.5</sup> || 2<sup>28</sup> || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]
+
|  | pseudo-collision || compression || all ||  || 2<sup>8</sup> || - || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
|-                     
 
|-                     
| style="background:greenyellow" | collision || hash || 512 ||  || 2<sup>252</sup> || - || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]
+
| style="background:greenyellow" | collision || hash || 512 ||  || 2<sup>252</sup> || 2<sup>9</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
|-                     
 
|-                     
|  style="background:yellow" | 2nd preimage || hash || 512 ||  || 2<sup>448</sup> || 2<sup>64</sup> || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]
+
|  style="background:orange" | collision || hash || 512 ||  || 2<sup>384+s</sup> || 2<sup>64-s</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
|-                                      
+
|-                   
|}                  
+
|  style="background:orange" | 2nd preimage || hash || 512 ||  || 2<sup>456</sup> || 2<sup>10</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 +
|-
 +
|}
  
 
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
 
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
  
 +
 +
<bibtex>
 +
@misc{twisterMRS08,
 +
  author    = {Florian Mendel and Christian Rechberger and Martin Schläffer},
 +
  title    = {Cryptanalysis of Twister},
 +
  url = {http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845},
 +
  howpublished = {In Proceedings of ACNS, Springer, To appear},
 +
  year = {2009},
 +
  abstract = {In this paper, we present a semi-free-start collision attack on the compression
 +
function for all Twister variants with negligible complexity. We show how this
 +
compression function attack can be extended to construct collisions for
 +
Twister-512 slightly faster than brute force search. Furthermore, we present a
 +
second-preimage and preimage attack for Twister-512 with complexity of about
 +
$2^{384}$ and $2^{456}$ compression function evaluations, respectively.}
 +
</bibtex>
 +
 +
 +
=== Archive ===
  
 
<bibtex>
 
<bibtex>

Revision as of 13:14, 25 March 2009

1 The algorithm


Ewan Fleischmann, Christian Forler, Michael Gorski - The Twister Hash Function Family

,2008
http://ehash.iaik.tugraz.at/uploads/3/39/Twister.pdf
Bibtex
Author : Ewan Fleischmann, Christian Forler, Michael Gorski
Title : The Twister Hash Function Family
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression all 28 - Mendel,Rechberger,Schläffer
collision hash 512 2252 29 Mendel,Rechberger,Schläffer
collision hash 512 2384+s 264-s Mendel,Rechberger,Schläffer
2nd preimage hash 512 2456 210 Mendel,Rechberger,Schläffer

A description of this table is given here.


Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2009
http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2009


2.1 Archive

Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2008
http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2008